First published: Mon May 20 2024(Updated: )
A flaw was found in the gnome-remote-desktop package. The gnome-remote-desktop system daemon performs inadequate validation of session agents using D-Bus methods related to transitioning a client connection from the login screen to the user session. As a result, the system RDP TLS certificate and key can be exposed to unauthorized users. This flaw allows a malicious user on the system to take control of the RDP client connection during the login screen-to-user session transition.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/gnome-remote-desktop | <46.2-1~ubuntu24.04.2 | 46.2-1~ubuntu24.04.2 |
ubuntu/gnome-remote-desktop | <46.2 | 46.2 |
debian/gnome-remote-desktop | 0.1.7-1 0.1.9-5 43.3-1 44.2-8 | |
redhat/gnome-remote-desktop | <46.2 | 46.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5148 has been rated as a medium severity vulnerability due to inadequate validation of session agents.
To fix CVE-2024-5148, upgrade the gnome-remote-desktop package to version 46.2 or later.
CVE-2024-5148 affects the gnome-remote-desktop package on Ubuntu, Debian, and Red Hat systems.
Security updates for gnome-remote-desktop related to CVE-2024-5148 are managed by the respective maintainers of Ubuntu, Debian, and Red Hat.
Failing to address CVE-2024-5148 can lead to unauthorized access or exploitation of remote desktop sessions.